Open Access
Subscription or Fee Access
Full Issue
View or download the full issue | FULL PDF |
Table of Contents
Articles
Using Interval Constrained Petri Nets and timed automata for diagnosis of dynamic systems | |
Dhouibi Hedi, Lobna Belgacem, L. Mhamdi, Zineb Simeu-Abazi | 735-743 |
An Efficient Real Time Moving Object Detection Scheme Using Diamond Search Algorithm and Mathematical Morphology | |
Djoudi Kerfa, M. F. Belbachir | 744-749 |
Multi Biometric Fuzzy Vault Generation Using Chaff Points and Cuckoo Search Optimization | |
K. Annapurani, Deepika Ravikumar, M. A. K. Sadiq | 750-756 |
Bayesian Network Model for Oath Statement Retrieval: A Case Study in Quranic Text Using Machine Learning Techniques | |
Ahmad Alqurneh, Aida Mustapha | 757-763 |
A Conceptual Foundation for Aspect-Oriented Modeling | |
Sabah Al-Fedaghi | 764-774 |
An Improved and Efficient Strong Remote User Authentication using Hash function and Smart card | |
Ramesh Sengodan, V. Murali Bhaskaran | 775-783 |
Image Noise Removal Using Rao-Blackwellized Particle Filter with Maximum Likelihood Estimation | |
Bobby Lukose, Anna Saro Vijendran | 784-792 |
An Efficient Salient Feature based Histology Image Retrieval | |
V. Vellingiri, M. Thirumarimurugan, T. Kannadasan | 793-802 |
Securing Data at Rest by Format Preserving Encryption Using Pass Phrase | |
S. Vidhya, K. Chitra | 803-808 |
An Efficient and Dynamic Data Placement, Data Mining and Knowledge Discovery Using Surrogate Object in Mobile Cloud Paradigm | |
S. Ravimaran, A. N. Gnana Jeevan, M. A. Maluk Mohamed | 809-824 |
An Efficient User Revocation and Encryption Methods for Secure Multi-Owner Data Sharing to Dynamic Groups in the Cloud | |
Gokul Geetha Narayanan, S. Raja Ranganathan, S. Karthik | 825-831 |
A Review on Structural Software-Based Self- Testing of Embedded Processors | |
Ateeq-Ur-Rehman Shaheen, Fawnizu Azmadi Hussin, Nor Hisham Hamid, Noohul Basher Zain Ali | 832-846 |
Swarm and Fuzzy Based Co-operative Cache Management Framework for MANET | |
A. Sureshkumar, R. Samson Ravindran | 847-853 |
Detection and Localization of Attackers in Wireless Networks | |
D. Sivakumar, B. Sivakumar | 854-864 |
Enhancement of Indoor Localization by Path-Loss Reduction Using Modified RSSI Technique | |
K. Vadivukkarasi, R. Kumar | 865-871 |
AAEM: Accessibility Assistance Evaluation Metric | |
B. Gohin, Viji Vinod | 872-882 |
Built-in Stigmergy-Based Load Balancing Model for HPC Clusters | |
Ahmed Adnane, H. Medromi | 883-891 |
XML Document Classification by Frequent Itemset Mining on Menonym Tree | |
D. Sasikala, K. Premalatha | 892-899 |
Erratum
Highly Robust Digital Image Watermarking Using Steerable Pyramid and Dual Encryption Technique (in: Vol. 9, n. 2, 2014) | |
Azz El Arab El Hossaini, Mohamed El Aroussi, Khadija Jamali, Samir Mbarki, Mohamed Wahbi | 900 |
Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize